What are the steps in a forensic investigation?
Once we receive your data, we will make a bit stream image of the media (hard drive, CD, DVD, or USB Flash drive) so that modifications are not made to the original evidence. A cryptographic hash of the original evidence will be used to verify that the original evidence has not been modified by comparing it to the bit stream image. A chain of custody document will be established and maintained throughout the investigation from receipt to return to fully protect the data. Once we acquire the image, we will perform an in-depth analysis of the data to see if necessary files can be recovered. Insight Computer Investigations, LLC will use the cutting edge forensic tools to conduct the analysis and provide a complete investigation report.